IBM Support

Security Bulletin: Rational Integration Tester HTTP/TCP Proxy component in Rational Test Virtualization Server and Rational Test Workbench affected by Netty vulnerabilities (CVE-2020-7238, CVE-2019-16869, CVE-2019-20445, CVE-2019-20444)

Security Bulletin


Summary

Netty is vulnerable to security issues affecting the Rational Integration Tester HTTP/TCP Proxy component in Rational Test Virtualization Server and Rational Test Workbench

Vulnerability Details

CVEID:   CVE-2020-7238
DESCRIPTION:   Netty is vulnerable to HTTP request smuggling, caused by a flaw when handling Transfer-Encoding whitespace and a later Content-Length header. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175398 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID:   CVE-2019-16869
DESCRIPTION:   Netty is vulnerable to HTTP request smuggling, caused by a flaw when handling unusual whitespaces before the colon in HTTP headers. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/167672 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID:   CVE-2019-20445
DESCRIPTION:   Netty could provide weaker than expected security, caused by non-proper handling of Content-Length and Transfer-Encoding in the HttpObjectDecoder.java. A remote attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175486 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:   CVE-2019-20444
DESCRIPTION:   Netty is vulnerable to HTTP request smuggling, caused by a flaw in the HttpObjectDecoder.java. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175487 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
HTTP/TCP Proxy component in Rational Test Virtualization Server8.7.1.2, 9.0.1.1, 9.1.1.1, 9.2.1.1, 9.5.0, 10.0.2.0
HTTP/TCP Proxy component in Rational Test Workbench8.7.1.2, 9.0.1.1, 9.1.1.1, 9.2.1.1, 9.5.0, 10.0.2.0

All versions prior to those shown are affected. Upgrade to the latest versions shown.


Remediation/Fixes

Upgrade your installation by following the instructions below:

  1. Verify the version of Rational Test Control Panel
  2. Download the fix for your product from Fix Central, this can be obtained for either Rational Test Workbench or Rational Test Virtualization Server by selecting the product and relevant version before browsing for fixes.  Select and download the 20200302-ifix for your selected product.
  3. Stop the HTTP/TCP proxy. 
  4. Navigate to the existing Rational Test Control Panel installation
        The default installation locations for these files are:
            Windows: C:\Program Files\IBM\RationalTestControlPanel\
            AIX, Linux, Solaris: /opt/IBM/RationalTestControlPanel/
  5. Copy the contents of the "httptcp" directory as a backup.
  6. Unzip the download fix into the RationalTestControlPanel directory, overwriting the existing files. 
  7. Start the HTTP/TCP proxy. 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

21 Feb 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSBLXN","label":"Rational Test Virtualization Server"},"Component":"Rational Integration Tester HTTP\/TCP Proxy","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"},{"code":"PF002","label":"AIX"}],"Version":"8.7, 9.0, 9.1, 9.2, 9.5, 10.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}},{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSBLQQ","label":"IBM Rational Test Workbench"},"Component":"Rational Integration Tester HTTP\/TCP Proxy","Platform":[{"code":"PF033","label":"Windows"},{"code":"PF016","label":"Linux"},{"code":"PF002","label":"AIX"}],"Version":"8.7, 9.0, 9.1, 9.2, 9.5, 10.0","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
05 March 2020

UID

ibm15692628